17 January 2024 Run length encoding based reversible data hiding scheme in encrypted images
Bharathi Chidirala, Bibhudendra Acharya
Author Affiliations +
Abstract

This paper presents a run length encoding (RLE) based reversible data hiding (RDH) scheme designed specifically for higher order pixel group values of image intensities. RDH aims to embed additional data into the host image while maintaining the ability to completely recover the original image without any loss. The proposed scheme utilizes the RLE technique to exploit the statistical characteristics of higher order intensity values in images. By identifying suitable run-length blocks within the image, the scheme intelligently embeds the additional data, ensuring efficient utilization of the available capacity. The model again encrypts the image after data embedding to establish the confidentiality as well as integrity of the hidden data, adding an extra layer of security to protect against unauthorized access and alterations. To achieve reversibility, the scheme carefully encodes the embedded data within the run-length segments, ensuring that the original image can be perfectly reconstructed. By embedding data, the visual quality of the image is intentionally reduced. However, using an encryption technique randomness is increased there by frustrating potential attackers when they attack. The average embedding capacity for a 512×512 image is approx. 177463 bits and the entropy after encryption is 7.999 bpp. Experimentation results demonstrate the efficacy of the proposed scheme in terms of reversibility, embedding capacity, and entropy values, thereby showcasing its potential for practical applications.

© 2024 SPIE and IS&T
Bharathi Chidirala and Bibhudendra Acharya "Run length encoding based reversible data hiding scheme in encrypted images," Journal of Electronic Imaging 33(1), 013018 (17 January 2024). https://doi.org/10.1117/1.JEI.33.1.013018
Received: 21 September 2023; Accepted: 29 December 2023; Published: 17 January 2024
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image processing

Data hiding

Image encryption

Histograms

Statistical analysis

Computer security

Data processing

RELATED CONTENT


Back to Top